Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    27/12/2024, 15:44

General

  • Target

    c4b8cfcc458f0d3bd3d856c53c855b716d4f3d77f39cdcf369e920b1b5e37c71.exe

  • Size

    199KB

  • MD5

    fe8562462302e1cee465dcaaa269a071

  • SHA1

    3a19dedd4222398cad7a584bcb48d4a4d9c45712

  • SHA256

    c4b8cfcc458f0d3bd3d856c53c855b716d4f3d77f39cdcf369e920b1b5e37c71

  • SHA512

    9c74ff8bba9ff805a076b0a7565389e57e7abc6196e64baac7ab7c6778b2f57a488025794e9b96315e0353b6ab9414f99d1466c42e4acafd243857fd5dabd6b1

  • SSDEEP

    3072:dctbTf75ImMEPrTxH1/Y7yEUktNZ3eRyozQ9Aiy:dctjGmMs7/Y+PUZuRyd9AF

Score
5/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c4b8cfcc458f0d3bd3d856c53c855b716d4f3d77f39cdcf369e920b1b5e37c71.exe
    "C:\Users\Admin\AppData\Local\Temp\c4b8cfcc458f0d3bd3d856c53c855b716d4f3d77f39cdcf369e920b1b5e37c71.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2236

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2236-1-0x0000000010000000-0x0000000010018000-memory.dmp

    Filesize

    96KB

  • memory/2236-0-0x0000000010000000-0x0000000010018000-memory.dmp

    Filesize

    96KB

  • memory/2236-2-0x0000000010000000-0x0000000010018000-memory.dmp

    Filesize

    96KB